Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
Hassan Jameel AsgharShujun LiRon SteinfeldJosef PieprzykPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- user authentication
- authentication protocol
- security protocols
- password guessing
- security analysis
- remote user authentication scheme
- smart card
- information security
- cryptographic protocols
- authentication scheme
- authentication systems
- biometric systems
- security requirements
- security mechanisms
- keystroke dynamics
- security threats
- intrusion detection
- biometric authentication
- security issues
- computer security
- security systems
- access control
- real time